• Title/Summary/Keyword: E-banking

Search Result 175, Processing Time 0.024 seconds

A Review of Machine Learning Algorithms for Fraud Detection in Credit Card Transaction

  • Lim, Kha Shing;Lee, Lam Hong;Sim, Yee-Wai
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.31-40
    • /
    • 2021
  • The increasing number of credit card fraud cases has become a considerable problem since the past decades. This phenomenon is due to the expansion of new technologies, including the increased popularity and volume of online banking transactions and e-commerce. In order to address the problem of credit card fraud detection, a rule-based approach has been widely utilized to detect and guard against fraudulent activities. However, it requires huge computational power and high complexity in defining and building the rule base for pattern matching, in order to precisely identifying the fraud patterns. In addition, it does not come with intelligence and ability in predicting or analysing transaction data in looking for new fraud patterns and strategies. As such, Data Mining and Machine Learning algorithms are proposed to overcome the shortcomings in this paper. The aim of this paper is to highlight the important techniques and methodologies that are employed in fraud detection, while at the same time focusing on the existing literature. Methods such as Artificial Neural Networks (ANNs), Support Vector Machines (SVMs), naïve Bayesian, k-Nearest Neighbour (k-NN), Decision Tree and Frequent Pattern Mining algorithms are reviewed and evaluated for their performance in detecting fraudulent transaction.

The Study on the Security Model for ActiveX Control Management through Security Authentication (보안 인증을 통한 ActiveX Control 보안 관리 모델에 관한 연구)

  • Park, Sung-Yong;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.113-119
    • /
    • 2009
  • In recent years, to provide visitors with the various and dynamic services, many ActiveX Controls are developed and distributed in most of the web sites such as e-Government Internet banking Portal in Korea. However, unsecure ActiveX Controls may be critical security threats on Internet User. Although hacking incidents increase sharply for these vulnerable ActiveX Controls, there are not enough national security actions or policies. Thus, in this paper we propose the technical method to design 'Security model for ActiveX Control Managemnet through Security Authentication' to be able safe and useful security management in three aspects of development distribution using.

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.6
    • /
    • pp.483-499
    • /
    • 2020
  • In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

Relationship Between Co-operative Society Governance And Members Satisfaction: A Case Study of the Ambrose Alli University Workers/Farmers Multi-Purpose Cooperative Society, Edo State, Nigeria

  • Ekhorutomwen, Asemota Abel;Peters, Ojeakeri Benson
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.4
    • /
    • pp.87-99
    • /
    • 2021
  • The study examines the relationship between co-operative society governance and members' satisfaction. Co-operative societies face problems of how to keep balance between efficiency and governance because those in charge of operations of co-operative; the board and the staff must meet two demands i.e. good business practice and the social responsibility which involves the satisfaction of members. The objective of this study is to examine the relationship between co-operative governance and members' satisfaction using Ambrose Alli University Workers/Farmers Multi -Purpose the Co-operative Society as a case study. The data collected in this study were obtained through structured questionnaire. Data analyzed were subjected to descriptive statistics and graphs. The data analyzed indicated that the challenges facing the co-operative society include theft /fraud and mismanagement. Members agitated for transformation of the co-operative society to operate in line with the guidelines of the Central Bank of Nigeria. It was recommended that for efficiency and high productivity, staff should be trained. Also there is need for innovative technology and the necessity for the cooperative society in question to network with other organizations.

Effects of Training and Development, Organizational Culture, Job Satisfaction, and Career Development on Employee Retention in Commercial Banks in Bangladesh

  • Md. Atikur, RAHAMAN;Md. Sayed, UDDIN;Wasib Bin, LATIF
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.91-97
    • /
    • 2023
  • In the current era of globalization, financial and banking organizations have been facing ever-growing challenges in the global market regarding retention, customer satisfaction, commitment, engagement, proper services, and the belief of their employees. Employees are regarded as an enormous asset for every organization that plays an important role in achieving the vision of the company. The objective of this study is to explore the determinants of bank employee retention and its impact on an organization in the context of Bangladesh. In terms of research purpose, non-probability convenience sampling has been used in this study, and the targeted population was the commercial bank employees of Bangladesh. In terms of data collection, the researchers have used the adopted questionnaires from previous studies. In this study, the total sample size was 180, and a questionnaire was sent to the respondents through e-mails. For analyzing the collected data, SPSS 26.0 version has been used to test the study model and the proposed hypotheses. This study shows that there were four independent variables training and development, organizational culture, job satisfaction, and career development have a positive and significant impact on employee retention. So, the bank management should organize the retention program for the welfare of the employees.

Impact of Service Quality on Behavioural Intention to Use Fin Tech Payment Services: An Extension of SERVEQUAL Model

  • Vikas Sharma;Sanjay Taneja;Munish Gupta;KshitizJangir;Ercan Ozen
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1093-1117
    • /
    • 2023
  • The study aims to determine the impact of quality outcomes on behavior intentions in Financial Technology (FinTech) payment services. The study is focused on the development and testing of the impact of the SERVQUAL model on the TAM, i.e., Technology Acceptance Model for the measurement of the behavioral intention of users to use fintech payment services. The sample entails 578 specific survey responses from northern India from October to December 2022. The respondents were users of FinTech. The PLS-SEM technique was employed to explain the implementation process. Consequently, it discovered a significant relationship between the SERVQUAL models and the impact on behavioral intentions identified by TAM. The study will provide insight into the factors that impact the quality outcomes and adoption of Fintech payment services to the providers. The paper demystifies FinTech payment services in the range of perception of service quality outcomes and provides essential theories. The TAM model reflects the customer's sense of satisfaction, usefulness, and attitude. In contrast, the SERVQUAL model demonstrates the user's assessment of service quality outcomes such as quality, trust, security, and service quality positively affects behavioral intention in FinTech payment services.

A History Check System of Public Electronic Certificate using OCSP Service (OCSP 서비스를 이용한 공인인증서 사용이력 확인 시스템)

  • Kim, Nam-Gon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.543-548
    • /
    • 2016
  • Public electronic certificates, as an important means for identification, have been used as the main economic transactions, including banking, e-government, e-commerce. identification. However, damage cases of certificates have been increased by Illegally issued and by hacking practices. Also the users have a difficult in ensuring that their certificates when and where to use. Therefore, the proposed system gives the organization code for the Institutions using OCSP services in advance, the organization code embedded in extensions of OCSP request message structure when institutions ask the validation of certificate to CA(Certificate Authority). Also, OCSP server can extract the organization code from OCSP request message, confirm the institution, and record it in certificate history management table of DB. In this paper, we presented a system that could determine the certificate history check using OCSP service, public electronic certificate validation service, and implemented to prevent and cope immediately with financial incidents.

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

A Study on ALTIBASETM LOG ANALYZER method for highly scalable, high-availability (고확장성, 고가용성을 위한 ALTIBASETM LOG ANALYZER 기법에 관한 연구)

  • Yang, Hyeong-Sik;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.1-12
    • /
    • 2014
  • Recently, the need for non-stop service is increasing by the business mission-critical Internet banking, e-payment, e-commerce, home shopping, securities trading, and petition business increases, clustered in a single database of existing, redundant research on high-availability technologies related to technique, etc. is increasing. It provides an API based on the Active Log in addition to the technique of redundancy, ALTIBASE$^{TM}$ Log Analyzer (below, ALA), provides scalability and communication of the same model or between heterogeneous. In this paper, we evaluated the performance of ALA by presenting the design of the database system that you can use the ALA, to satisfy all the synchronization features high scalability and high availability, real-time.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.